Paradigms for Mobile Agent-Based Active Monitoring of Network Systems

Thumbnail Image

View/Download File

Persistent link to this item

View Statistics

Journal Title

Journal ISSN

Volume Title


Paradigms for Mobile Agent-Based Active Monitoring of Network Systems

Published Date






We present here the design of a framework for building future generation network monitoring systems using mobile agents. It is designed to support dynamic configurability, extensibility, active monitoring, and secure operations.The policies for monitoring and information filtering implemented by agents can be modified remotely and dynamically. New event types and their detection procedures can be inclemently added in this system, and any desired event data aggregation policies can be defined using the publisher-subscriber model. The use of Prolog-based logic databases provides high level and easy-to-use abstractions for defining and detecting new events based on correlation of lower level events. Active monitoring in this system is supported by the incorporation of trigger rules that cause detection of an event to be initiated when certain other events are observed. The use of Ajanta, a secure mobile agent programming platform, provides the necessary infrastructure for protecting the monitoring system from attacks. We present here a set of experiments that we conducted using this system to evaluate and demonstrate its capabilities.



Related to



Series/Report Number

Funding information

Isbn identifier

Doi identifier

Previously Published Citation

Suggested citation

Tripathi, Anand; Ahmed, Tanvir; Pathak, Sumedh; Carney, Megan; Dokas, Paul. (2001). Paradigms for Mobile Agent-Based Active Monitoring of Network Systems. Retrieved from the University Digital Conservancy,

Content distributed via the University Digital Conservancy may be subject to additional license and use restrictions applied by the depositor. By using these files, users agree to the Terms of Use. Materials in the UDC may contain content that is disturbing and/or harmful. For more information, please see our statement on harmful content in digital repositories.